Category Reports
Want to know more about a cybersecurity product or market space in an easy-to-digest report you can read in 5 minutes? These are the reports for you.

Category Report: Passwordless Authentication
Unlocking the future, one login at a time. Embracing passwordless authentication has become increasingly essential as it revolutionizes how we secure our digital identities. Dive into the world of passwordless authentication and explore how it's reshaping digital protection.
Mike Privette /

Category Report: Attack Surface Management (ASM)
What you don’t see can hurt you. Managing your attack surface has become increasingly important while at the same time becoming increasingly complex.
Mike Privette /

Deception Technologies
The best offense is a good defense. Purposefully misleading or deceiving would-be attackers with traps and decoys is a way to have a canary in the coal mine.
Mike Privette /

Breach & Attack Simulation
Security is point-in-time. It’s not a matter of if you get hacked, but when. Why not simulate hacking yourself to get better at attack detection and response?
Mike Privette /

Data Access Governance
Data is the currency of business, and as trends in privacy and cybersecurity grow, it becomes increasingly important to govern access to that data.
Mike Privette /

API Security
APIs are everywhere. They are a critical part of modern mobile, SaaS, and web applications. They make up peer-to-peer networks and are how the Internet of things (IoT) functions. Let's unpack the cybersecurity vendor and landscape around APIs.
Mike Privette /

Endpoint Detection and Response (EDR)
Few frontiers in cybersecurity are as highly attacked and as highly defended as the computers and mobile devices we use in everyday life (like the one you’re on now). Let’s unpack the Endpoint Detection and Response (EDR) space and all it entails.
Mike Privette /

Third-Party Security
Trust reigns supreme in business, and ensuring your company’s data is secure with your third-party vendors has never been more critical. Let’s unpack this complex topic from a product landscape perspective.
Mike Privette /

What is Cloud Security Posture Management (CSPM)?
The cloud can be a dark and stormy place. Let’s take a look at the vendor landscape surrounding the exceptionally hot area of identifying and mitigating cloud security risks.
Mike Privette /

What is Anti-Phishing?
Phishing has arguably been the single most devastating cybersecurity threat to the world since its inception in 1990. Let’s take a look at this area and all the various cybersecurity products that play in the space.
Mike Privette /

What is Security Orchestration Automation and Response (SOAR)?
What is Security Orchestration, Automation, and Response (SOAR)? Let’s break this down and understand both sides of this product market space.
Mike Privette /

What is Zero Trust?
Zero Trust, can mean many different things to many different people. Let’s break this down further and understand both sides of the market.
Mike Privette /